praka123
left this forum longback
July 31, 2007
Researchers expose Microsoft Vista's kernel security
Free utility shows up 64-bit version of OS
By Gregg Keizer, Computerworld
A security feature in the 64-bit version of Windows Vista can be easily circumvented with a free utility that loads unsigned drivers into the kernel, according to researchers at Symantec.
Advert
Among 64-bit Vista's security provisions is one new to Microsoft's operating systems: only digitally-signed code can be loaded into the kernel. Under those new rules, code destined for the kernel - typically drivers - must be accompanied by a signed certificate available from a limited number of issuing authorities. Drivers not equipped with a legitimate certificate aren't loaded.
The thinking behind the move was that it would stymie rootkits, which load driver code into the kernel as part of their cloaking tactics.
But a pair of Symantec security researchers pointed to a free utility from Australian developer Linchpinlabs as one easy work-around. LinchpinLabs' Atsiv, said Ollie Whitehouse, an architect with Symantec's advanced threats research team, uses signed drivers to load other, unsigned code, into the Vista kernel.
"[Atsiv's] command line tool loads [its own] appropriate driver, which then in turn allows loading of unsigned drivers due to the implementation of their PE loader," said Whitehouse. "A side effect of using their own load is noted by the authors in their design documentation: 'Atsiv doesn't add the driver to the PsLoadedModuleslist so it is not visible in the standard drivers list.'
"This is rootkit-type behaviour," said Whitehouse.
One of LinchpinLabs' developers, identified only as "Dan," argued on rootkit.com that Vista's signing requirement "doesn't prevent malware, it just prohibits freedom to choose." Dan also claimed that Microsoft could never prevent hackers from obtaining legitimate certificates.
"A signed file uniquely identifies the company that developed that file, but when companies can be created and registered in jurisdictions known for protecting the privacy of company founders and directors you have to ask what does driver signing actually represent?" Dan asked. "While driver signing certificates can be revoked, new certificates, with enough money, can be created faster than it takes to change a file's signature. If this is indeed the case, then it is the hobbyists and home user that end up paying the cost."
Whitehouse agreed that the only way Microsoft can enforce the ban on unsigned kernel code is to revoke the certificate. "It'll be interesting to see how long it takes Microsoft to do this," Whitehouse said. "Secondly, as [Dan] points out, all it will take is someone to register another company, obtain another signing certificate, and the process will start over again."
Although both involve the Vista 64-bit kernel, the code signing requirement is not directly connected with PatchGuard, a protection scheme that bans so-called "kernel patching" or "kernel hooking" techniques. PatchGuard was the focus of a long-running dispute between Microsoft and several security vendors, Symantec included, over access to the kernel.
Symantec, McAfee and others argued that they needed to inject their own code into the kernel in order to protect users from the stealthiest kinds of malware.
Microsoft did not immediately reply to questions about whether it would revoke the certificate used by Atsiv.
source:
*www.computerworlduk.com/technology/operating-systems/windows/news/index.cfm?newsid=4297&print
I hope "vistaclub guy" can get some real news!.
In other news:
Researchers expose Microsoft Vista's kernel security
Free utility shows up 64-bit version of OS
By Gregg Keizer, Computerworld
A security feature in the 64-bit version of Windows Vista can be easily circumvented with a free utility that loads unsigned drivers into the kernel, according to researchers at Symantec.
Advert
Among 64-bit Vista's security provisions is one new to Microsoft's operating systems: only digitally-signed code can be loaded into the kernel. Under those new rules, code destined for the kernel - typically drivers - must be accompanied by a signed certificate available from a limited number of issuing authorities. Drivers not equipped with a legitimate certificate aren't loaded.
The thinking behind the move was that it would stymie rootkits, which load driver code into the kernel as part of their cloaking tactics.
But a pair of Symantec security researchers pointed to a free utility from Australian developer Linchpinlabs as one easy work-around. LinchpinLabs' Atsiv, said Ollie Whitehouse, an architect with Symantec's advanced threats research team, uses signed drivers to load other, unsigned code, into the Vista kernel.
"[Atsiv's] command line tool loads [its own] appropriate driver, which then in turn allows loading of unsigned drivers due to the implementation of their PE loader," said Whitehouse. "A side effect of using their own load is noted by the authors in their design documentation: 'Atsiv doesn't add the driver to the PsLoadedModuleslist so it is not visible in the standard drivers list.'
"This is rootkit-type behaviour," said Whitehouse.
One of LinchpinLabs' developers, identified only as "Dan," argued on rootkit.com that Vista's signing requirement "doesn't prevent malware, it just prohibits freedom to choose." Dan also claimed that Microsoft could never prevent hackers from obtaining legitimate certificates.
"A signed file uniquely identifies the company that developed that file, but when companies can be created and registered in jurisdictions known for protecting the privacy of company founders and directors you have to ask what does driver signing actually represent?" Dan asked. "While driver signing certificates can be revoked, new certificates, with enough money, can be created faster than it takes to change a file's signature. If this is indeed the case, then it is the hobbyists and home user that end up paying the cost."
Whitehouse agreed that the only way Microsoft can enforce the ban on unsigned kernel code is to revoke the certificate. "It'll be interesting to see how long it takes Microsoft to do this," Whitehouse said. "Secondly, as [Dan] points out, all it will take is someone to register another company, obtain another signing certificate, and the process will start over again."
Although both involve the Vista 64-bit kernel, the code signing requirement is not directly connected with PatchGuard, a protection scheme that bans so-called "kernel patching" or "kernel hooking" techniques. PatchGuard was the focus of a long-running dispute between Microsoft and several security vendors, Symantec included, over access to the kernel.
Symantec, McAfee and others argued that they needed to inject their own code into the kernel in order to protect users from the stealthiest kinds of malware.
Microsoft did not immediately reply to questions about whether it would revoke the certificate used by Atsiv.
source:
*www.computerworlduk.com/technology/operating-systems/windows/news/index.cfm?newsid=4297&print
I hope "vistaclub guy" can get some real news!.
In other news:
*www.computerworlduk.com/management/infrastructure/applications/news/index.cfm?newsid=4306&printBusiness doubts grow about Vista migration
Users are happy with what they have or considering Linux and Macs
By Gregg Keizer, Computerworld
Fewer businesses are now planning to move to Windows Vista than seven months ago, according to a survey by patch management vendor PatchLink, while more said they will either stick with the Windows they have, or turn to Linux or Mac OS X.
Advert
In a just-released poll of more than 250 of its clients, PatchLink noted that only 2% said they are already running Vista, while another 9% said they planned to roll out Vista in the next three months. A landslide majority, 87%, said they would stay with their existing version(s) of Windows.
Those numbers contrasted with a similar survey PatchLink published in December 2006. At the time, 43% said they had plans to move to Vista while just 53% planned to keep what Windows they had.
Today's hesitation also runs counter to what companies thought they would do as of late last year. In PatchLink's December poll, 28% said they would deploy Vista within the first year of its release. But by the results of the latest survey, fewer than half as many - just 11% - will have opted for the next-generation operating system by 1 November.
Their change of heart may be because of a changed perception of Vista's security skills. Seven months ago - within weeks of Vista's official launch to business, but before the operating system started selling in retail - 50% of the CIOs, CSOs, IT and network administrators surveyed by PatchLink said they believe Vista to be more secure than Windows XP.
The poll put the security sceptics at 15% and those who weren't sure yet at 35%.
Today, said PatchLink, only 28% agreed that Vista is more secure than XP. Meanwhile, the no votes increased to 24% and the unsure climbed to 49%.
Sewcond thoughts about Vista have given rival operating systems a second chance at breaking into corporations. Last year, Linux and Max OS X had only meager appeal to the CIOs, CSOs, IT and network administrators surveyed: 2% said they planned to deploy the open-source Linux, while none owned up to Mac OS X plans.
July's survey, however, noted a six-fold increase in the total willing to do without Windows on at least some systems: 8% of those polled acknowledged Linux plans and 4% said they would deploy Mac OS X.
PatchLink's survey results fit with research firms' continued forecasts that corporate deployment of Vista won't seriously begin until early next year. Although Microsoft recently announced it had shipped 60 million copies of Vista so far, it has declined to specify how many buyers are businesses, or even what percentage of the estimated 42 million PCs covered by corporate license agreements have actually upgraded to Vista.
The poll also offered evidence that corporations are even more afraid of zero-day vulnerabilities -- bugs still unpatched when they're made public or used in exploits -- than they were last year.
Zero-day vulnerabilities are the top security concern for the majority of IT professionals, according to the survey, with 53% of those polled ranking it as a major worry. In the December 2006 survey, only 29% of the administrators pegged zero-days as their top problem.
"The prospect of zero-day attacks is extremely troubling for organizations of all sizes," said Charles Kolodgy, an IDC research director, in a statement accompanying the survey. "Today's financially motivated attackers are creating customized, sophisticated malware designed to exploit unpublished application vulnerabilities in specific applications before they can be fixed."
Last edited: